what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Delikon

Email addressich at delikon.de
First Active2002-08-23
Last Active2004-10-01
zinfexploit.c
Posted Oct 1, 2004
Authored by Delikon, Luigi Auriemma | Site delikon.de

Remote exploit for Zinf 2.2.1 on Win32 that downloads and executes a file.

tags | exploit, remote
systems | windows
SHA-256 | e80d2409b6e269d59edd99db2b19a5529b757d7eb1f822c75d015ee3aba48dbb
UPolyXv0.3.rar
Posted Sep 17, 2004
Authored by Delikon | Site delikon.de

UPolyX version 0.3 is a simple polymorphic open-source UPX scrambler. Comes with VC6 source code.

SHA-256 | 76f803c4a241d2b65788305267750d8bb9e1ae284387570a49288f288b7670e9
BJDExploit.rar
Posted Sep 10, 2004
Authored by Delikon | Site delikon.de

Buffer overflow exploit for BlackJumboDog FTP server version 3.6.1 that opens up port 7777 allowing for an executable upload.

tags | exploit, overflow
SHA-256 | d0a6cb671c15fdedc7d54c9417ea2d03b420c6181c6f36fa5782a5866cab377d
upload-exec-shellcode.c
Posted May 11, 2004
Authored by Delikon | Site delikon.de

459 byte upload and execute shellcode for Windows 2000 and XP.

tags | shellcode
systems | windows
SHA-256 | da0aa57a7273af5d6889c71b75bd70f0af07e0c0de19376285710e1118a837f1
win32-shellcoding-tutorial.zip
Posted Dec 15, 2003
Authored by Delikon | Site delikon.de

A simple tutorial on Windows Shellcoding - Shows how to write shellcode in asm that spawns a cmd shell. Includes tools to encode the asm code to avoid NULL bytes, and to generate the typical C shellcode. In Powerpoint and PDF format.

tags | paper, shell, shellcode
systems | windows
SHA-256 | d612a88f1dba4e28d11743cd0d9579d520bc1ffcfcc355aa2d650faad3da1111
SFPDisable.zip
Posted Oct 14, 2003
Authored by Delikon | Site delikon.de

SFPDisable is a utility that disable Microsoft Windows' File Protection by patching sfc.dll under Windows 2000 and sfc_os.dll in Windows XP. This allows a remote attacker to delete, manipulate, and backdoor any file on the system without Windows noticing upon reboot.

tags | remote
systems | windows
SHA-256 | 24605e3feea0bdf775d9c1ce2ac24e839a5e8effde6a87883b62062b173e2fca
shellcode-v2.0.zip
Posted Apr 21, 2003
Authored by Delikon | Site delikon.de

Shellcode-v2.0 is a genetic win32 shellcode generator based mainly on kungfoo. You can generate a shellcode with the help of a GUI. Source and executable included.

Changes: The shellcode will be XOR-encoded to avoid NULLS.
tags | shellcode
systems | windows
SHA-256 | bf21bbcff72608584169174404116a665444ac4b9bdc106694a2fe9770f56f35
hl-headnut.c
Posted Apr 10, 2003
Authored by Delikon | Site delikon.de

Denial of service exploit against Half-life servers. After sending 3 specially formed packets the server is unresponsive and there is 100% CPU utilization. Tested against versions 3.1.1.0 under Suse Linux 7.3 and Windows 2000.

tags | exploit, denial of service
systems | linux, windows, suse
SHA-256 | f6925a6a151cb89c26585acb1aea48df880c09ff4bfd634972dca9999ce666cd
shellcode-v1.0.zip
Posted Sep 25, 2002
Authored by Delikon | Site delikon.de

Shellcode-v1.0.zip is a genetic win32 shellcode generator based mainly on kungfoo. You can generate a shellcode with the help of a GUI. Source and executable included.

tags | shellcode
systems | windows
SHA-256 | 7ceadbc837c0a293c10e87c625f4338c9ca2fa138a5049d58d67ace148db452d
fmt.tar.gz
Posted Aug 23, 2002
Authored by Delikon | Site delikon.de

Fmt.tar.gz contains tutorials in English and German on exploiting local format string vulnerabilities. This is a summary of tutorials from http://community.core-sdi.com/~juliano and includes sample code.

tags | paper, web, local, vulnerability
systems | unix
SHA-256 | d8734dad39eae6eac7936a0b8293ae59adf0e02e8af61b742dc02ed9c0a777dc
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close